Opportunistic multi-modal user authentication for health-tracking IoT wearables

A Muratyan, W Cheung, SV Dibbo… - … Safety and Security with IoT …, 2022 - Springer
… development of an implicit wearable user authentication mechanism by using the … use
oxygen saturation data to develop user authentication models. Next, we develop an authentication

HIAuth: A hierarchical implicit authentication system for IoT wearables using multiple biometrics

S Vhaduri, SV Dibbo, W Cheung - Ieee Access, 2021 - ieeexplore.ieee.org
… -wearables either do not have any user authentication or … of a hierarchical implicit user
authentication (HIAuth) system … in most of the market wearables. While this work demonstrates the …

[PDF][PDF] Multi-Device Authentication using Wearables and IoT.

J Hajny, P Dzurenda, L Malina - SECRYPT, 2016 - pdfs.semanticscholar.org
… Furthermore, involving wearables and IoT devices makes it possible to use multiple
authentication factors, such as user’s position, his behavior and the state of the surrounding …

On-phone CNN model-based implicit authentication to secure IoT wearables

SV Dibbo, W Cheung, S Vhaduri - … on Safety and Security with IoT …, 2022 - Springer
authentication system for the wearables leveraging the sensing and computation power of
smartphones and IoT … The core piece of this implicit wearable user authentication system is a …

Wearable devices and IoT

T Poongodi, R Krishnamurthi, R Indrakumari… - … of Internet of Things in …, 2020 - Springer
users will wear minimum 5 wearables in 2020. Moreover, 60% believe that wearables in the
next … of two different user utilized for device authentication between two wearable devices of …

A lightweight anonymous user authentication and key establishment scheme for wearable devices

A Gupta, M Tripathi, TJ Shaikh, A Sharma - Computer Networks, 2019 - Elsevier
… model uses three types of cryptosystems to achieve the mutual authentication, user
anonymous user authentication scheme for the communication on the Internet of Things (IoT) based …

Recent advances in biometrics-based user authentication for wearable devices: A contemporary survey

S Liu, W Shao, T Li, W Xu, L Song - Digital Signal Processing, 2022 - Elsevier
user authentication in wearable devices. Overall, in this survey, we systematically study assorted
state-of-the-art user authentication methods for wearable … with an IoT platform to monitor …

Design of secure and lightweight authentication protocol for wearable devices environment

AK Das, M Wazid, N Kumar, MK Khan… - IEEE journal of …, 2017 - ieeexplore.ieee.org
… new lightweight authentication scheme suitable for wearable … a user to mutually authenticate
his/her wearable device(s) … same user) for secure communication between the wearable de…

A usable and robust continuous authentication framework using wearables

A Acar, H Aksu, AS Uluagac… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
… of works have been proposed for the use of biometrics in continuous user authentication [11],
[12], … His research interests include continuous authentication, and IoT security/privacy, and …

Continuous authentication and authorization for the internet of things

M Shahzad, MP Singh - IEEE Internet Computing, 2017 - ieeexplore.ieee.org
… Compared with traditional gaitrecognition systems, which use cameras, floor sensors, or
wearable sensors to capture gait information, WifiU is easier to deploy and has better coverage. …